@@ -16,7 +16,10 @@ Features:
1616* Collection of injected modules detected by MemProcFS PE_INJECT for further analysis (PW: infected)
1717* Extracting IPv4/IPv6
1818* IP2ASN Mapping and GeoIP w/ [ IPinfo CLI] ( https://github.com/ipinfo/cli ) → ; Get your token for free at [ https://ipinfo.io/signup ] ( https://ipinfo.io/signup )
19+ * Checking for Suspicious Port Numbers
20+ * Process Tree (TreeView) including complete Process Call Chain (Special thanks to [ DaFuqs] ( https://github.com/DaFuqs ) )
1921* Checking Processes for Unusual Parent-Child Relationships and Number of Instances
22+ * Checking for Process Path Masquerading and Process Name Masquerading (Damerau Levenshtein Distance)
2023* Web Browser History (Google Chrome, Microsoft Edge and Firefox)
2124* Extracting Windows Event Log Files and processing w/ EvtxECmd → ; Timeline Explorer ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
2225* Analyzing extracted Amcache.hve w/ Amcacheparser ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
@@ -40,67 +43,76 @@ Download the latest version of **MemProcFS-Analyzer** from the [Releases](https:
4043## Usage
4144Launch Windows PowerShell (or Windows PowerShell ISE or Visual Studio Code w/ PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
4245
43- ![ File-Browser] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/01.png )
46+ ![ File-Browser] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/01.png )
4447** Fig 1:** Select your Raw Physical Memory Dump (File Browser)
4548
46- ![ Auto-Install] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/02.png )
49+ ![ Auto-Install] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/02.png )
4750** Fig 2:** MemProcFS-Analyzer auto-installs dependencies (First Run)
4851
49- ![ Microsoft-Internet-Symbol-Store] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/03.png )
52+ ![ Microsoft-Internet-Symbol-Store] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/03.png )
5053** Fig 3:** Accept Terms of Use (First Run)
5154
52- ![ MemProcFS] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/04.png )
55+ ![ MemProcFS] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/04.png )
5356** Fig 4:** If you find MemProcFS useful, please become a sponsor at: https://github.com/sponsors/ufrisk
5457
55- ![ Mounted] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/05.png )
58+ ![ Mounted] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/05.png )
5659** Fig 5:** You can investigate the mounted memory dump by exploring drive letter X:
5760
58- ![ Auto-Update] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/06.png )
61+ ![ Auto-Update] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/06.png )
5962** Fig 6:** MemProcFS-Analyzer checks for updates (Second Run)
6063
6164Note: It's recommended to uncomment/disable the "Updater" function after installation. Check out the "Main" in the bottom of the script.
6265
63- ![ ClamAV-Scan] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/07.png )
66+ ![ ClamAV-Scan] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/07.png )
6467** Fig 7:** FindEvil feature and additional analytics
6568
66- ![ Processes] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/08.png )
69+ ![ Processes] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/08.png )
6770** Fig 8:** Processes
6871
69- ![ RunningAndExited] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/09.png )
72+ ![ RunningAndExited] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/09.png )
7073** Fig 9:** Running and Exited Processes
7174
72- ![ IPinfo ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/10.png )
73- ** Fig 10:** GeoIP w/ IPinfo.io
75+ ![ ProcessTree ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/10.png )
76+ ** Fig 10:** Process Tree (GUI)
7477
75- ![ MapReport ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/11.png )
76- ** Fig 11:** Map IPs w/ IPinfo.io
78+ ![ ProcessTreeSearch ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/11.png )
79+ ** Fig 11:** Checking Process Tree (to find anomalies)
7780
78- ![ EVTX ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/12.png )
79- ** Fig 12:** Processing Windows Event Logs (EVTX)
81+ ![ ProcessTreeAlerts ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/12.png )
82+ ** Fig 12:** Process Tree: Alert Messages w/ Process Call Chain
8083
81- ![ Amcache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/13.png )
82- ** Fig 13:** Processing extracted Amcache.hve &# 8594 ; XLSX
84+ ![ IPinfo ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/13.png )
85+ ** Fig 13:** GeoIP w/ IPinfo.io
8386
84- ![ ShimCache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/14.png )
85- ** Fig 14:** Processing ShimCache &# 8594 ; XLSX
87+ ![ MapReport ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/14.png )
88+ ** Fig 14:** Map IPs w/ IPinfo.io
8689
87- ![ Timeline-Explorer ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/15.png )
88- ** Fig 15:** Analyze CSV output w/ Timeline Explorer (TLE )
90+ ![ EVTX ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/15.png )
91+ ** Fig 15:** Processing Windows Event Logs (EVTX )
8992
90- ![ ELK-Import ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/16.png )
91- ** Fig 16:** ELK Import
93+ ![ Amcache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/16.png )
94+ ** Fig 16:** Processing extracted Amcache.hve &# 8594 ; XLSX
9295
93- ![ ELK-Timeline ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/17.png )
94- ** Fig 17:** Happy ELK Hunting!
96+ ![ ShimCache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/17.png )
97+ ** Fig 17:** Processing ShimCache &# 8594 ; XLSX
9598
96- ![ Secure-Archive-Container ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/18.png )
97- ** Fig 18:** Multi-Threaded ClamAV Scan to help you finding evil! ;- )
99+ ![ Timeline-Explorer ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/18.png )
100+ ** Fig 18:** Analyze CSV output w/ Timeline Explorer (TLE )
98101
99- ![ Message-Box ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/19.png )
100- ** Fig 19:** Press ** OK ** to shutdown MemProcFS and Elastisearch/Kibana
102+ ![ ELK-Import ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/19.png )
103+ ** Fig 19:** ELK Import
101104
102- ![ Output] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/20.png )
103- ** Fig 20:** Secure Archive Container (PW: MemProcFS)
105+ ![ ELK-Timeline] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/20.png )
106+ ** Fig 20:** Happy ELK Hunting!
107+
108+ ![ Secure-Archive-Container] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/21.png )
109+ ** Fig 21:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
110+
111+ ![ Message-Box] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/22.png )
112+ ** Fig 22:** Press ** OK** to shutdown MemProcFS and Elastisearch/Kibana
113+
114+ ![ Output] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/23.png )
115+ ** Fig 23:** Secure Archive Container (PW: MemProcFS)
104116
105117## Introduction MemProcFS and Memory Forensics
106118Check out [ Super Easy Memory Forensics] ( https://www.slideshare.net/IIJ_PR/super-easy-memory-forensics ) by [ Hiroshi Suzuki] ( https://twitter.com/herosi_t ) and [ Hisao Nashiwa] ( https://twitter.com/unk0unk0 ) .
@@ -153,10 +165,10 @@ https://ericzimmerman.github.io/
153165ClamAV - Download → ; Alternate Versions → ; Windows Packages → ; Win64 → ; clamav-0.105.1.win.x64.msi (2022-07-26)
154166https://www.clamav.net/downloads#otherversions
155167
156- Dokany Library Bundle v2.0.5 .1000 (2022-07-04 )
168+ Dokany Library Bundle v2.0.6 .1000 (2022-10-02 )
157169https://github.com/dokan-dev/dokany/releases/latest → ; DokanSetup.exe
158170
159- Elasticsearch 8.4.1 (2022-08-30 )
171+ Elasticsearch 8.4.3 (2022-10-05 )
160172https://www.elastic.co/downloads/elasticsearch
161173
162174entropy v1.0 (2022-02-04)
@@ -168,16 +180,16 @@ https://ericzimmerman.github.io/
168180ImportExcel 7.8.1 (2022-09-03)
169181https://github.com/dfinke/ImportExcel
170182
171- Ipinfo CLI 2.8.1 (2022-05-23 )
183+ Ipinfo CLI 2.10.0 (2022-09-28 )
172184https://github.com/ipinfo/cli
173185
174- Kibana 8.4.1 (2022-08-30 )
186+ Kibana 8.4.3 (2022-10-05 )
175187https://www.elastic.co/downloads/kibana
176188
177189lnk_parser v0.2.0 (2022-08-10)
178190https://github.com/AbdulRhmanAlfaifi/lnk_parser
179191
180- MemProcFS v5.0.3 - The Memory Process File System (2022-08-04 )
192+ MemProcFS v5.1.1 - The Memory Process File System (2022-09-26 )
181193https://github.com/ufrisk/MemProcFS
182194
183195RECmd v2.0.0.0 (.NET 6)
0 commit comments