Skip to content

Commit cb0a4aa

Browse files
authored
Update README.md
1 parent aba7e84 commit cb0a4aa

File tree

1 file changed

+60
-40
lines changed

1 file changed

+60
-40
lines changed

README.md

Lines changed: 60 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,12 @@ https://github.com/ufrisk/MemProcFS
77
Features:
88
* Fast and easy memory analysis!
99
* You can mount a Raw Physical Memory Dump like a disk image and handle the memory compression feature on Windows
10-
* Auto-Install of MemProcFS, Elasticsearch, Kibana, EvtxECmd, AmcacheParser, AppCompatCacheParser, RECmd, SBECmd, ImportExcel, IPinfo CLI, and xsv
11-
* Auto-Update of MemProcFS, Elasticsearch, Kibana, ClamAV Virus Databases (CVD), EvtxECmd (incl. Maps), AmcacheParser, AppCompactCacheParser, RECmd, SBECmd, Import-Excel, IPinfo CLI, and xsv
10+
* Auto-Install of MemProcFS, AmcacheParser, AppCompatCacheParser, Elasticsearch, entropy, EvtxECmd, ImportExcel, IPinfo CLI, Kibana, lnk_parser, RECmd, SBECmd, xsv, and YARA
11+
* Auto-Update of MemProcFS, AmcacheParser, AppCompatCacheParser, Elasticsearch, entropy, EvtxECmd (incl. Maps), ImportExcel, IPinfo CLI, Kibana, lnk_parser, RECmd, SBECmd, xsv, and YARA
1212
* Update-Info when there's a new version of ClamAV or a new Dokany File System Library Bundle available
13-
* Multi-Threaded scan w/ ClamAV for Windows
1413
* OS Fingerprinting
14+
* Multi-Threaded scan w/ ClamAV for Windows
15+
* Collection of infected files detected by ClamAV for further analysis (PW: infected)
1516
* Collection of injected modules detected by MemProcFS PE_INJECT for further analysis (PW: infected)
1617
* Extracting IPv4/IPv6
1718
* IP2ASN Mapping and GeoIP w/ [IPinfo CLI](https://github.com/ipinfo/cli) → Get your token for free at [https://ipinfo.io/signup](https://ipinfo.io/signup)
@@ -25,6 +26,10 @@ Features:
2526
* Analyzing ShellBags Artifacts w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
2627
* Analyzing Auto-Start Extensibility Points (ASEPs) w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
2728
* Analyzing RecentDocs, Office Trusted Document w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
29+
* Analyzing Registry w/ Kroll RECmd Batch File ([Kroll Batch File](https://github.com/EricZimmerman/RECmd/projects/1) by Andrew Rathbun)
30+
* Analyzing Metadata of Recovered Process Modules (experimental)
31+
* Extracting Windows Shortcut Files (LNK)
32+
* Hunting Malicious Windows Shortcut Files (LNK)
2833
* Integration of PowerShell module [ImportExcel](https://github.com/dfinke/ImportExcel) by Doug Finke
2934
* CSV output data for analysis w/ Timeline Explorer (e.g. timeline-reverse.csv, findevil.csv, web.csv)
3035
* Collecting Evidence Files (Secure Archive Container → PW: MemProcFS)
@@ -35,61 +40,67 @@ Download the latest version of **MemProcFS-Analyzer** from the [Releases](https:
3540
## Usage
3641
Launch Windows PowerShell (or Windows PowerShell ISE or Visual Studio Code w/ PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
3742

38-
![File-Browser](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/01.png)
43+
![File-Browser](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/01.png)
3944
**Fig 1:** Select your Raw Physical Memory Dump (File Browser)
4045

41-
![Auto-Install](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/02.png)
46+
![Auto-Install](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/02.png)
4247
**Fig 2:** MemProcFS-Analyzer auto-installs dependencies (First Run)
4348

44-
![Microsoft-Internet-Symbol-Store](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/03.png)
49+
![Microsoft-Internet-Symbol-Store](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/03.png)
4550
**Fig 3:** Accept Terms of Use (First Run)
4651

47-
![MemProcFS](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/04.png)
52+
![MemProcFS](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/04.png)
4853
**Fig 4:** If you find MemProcFS useful, please become a sponsor at: https://github.com/sponsors/ufrisk
4954

50-
![Mounted](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/05.png)
55+
![Mounted](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/05.png)
5156
**Fig 5:** You can investigate the mounted memory dump by exploring drive letter X:
5257

53-
![Auto-Update](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/06.png)
58+
![Auto-Update](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/06.png)
5459
**Fig 6:** MemProcFS-Analyzer checks for updates (Second Run)
5560

5661
Note: It's recommended to uncomment/disable the "Updater" function after installation. Check out the "Main" in the bottom of the script.
5762

58-
![ClamAV-Scan](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/07.png)
63+
![ClamAV-Scan](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/07.png)
5964
**Fig 7:** FindEvil feature and additional analytics
6065

61-
![IPinfo](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/08.png)
62-
**Fig 8:** GeoIP w/ IPinfo.io
66+
![Processes](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/08.png)
67+
**Fig 8:** Processes
68+
69+
![RunningAndExited](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/09.png)
70+
**Fig 9:** Running and Exited Processes
71+
72+
![IPinfo](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/10.png)
73+
**Fig 10:** GeoIP w/ IPinfo.io
6374

64-
![IPinfo](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/09.png)
65-
**Fig 9:** Map IPs w/ IPinfo.io
75+
![MapReport](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/11.png)
76+
**Fig 11:** Map IPs w/ IPinfo.io
6677

67-
![Elasticsearch](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/10.png)
68-
**Fig 10:** Processing Windows Event Logs (EVTX)
78+
![EVTX](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/12.png)
79+
**Fig 12:** Processing Windows Event Logs (EVTX)
6980

70-
![Amcache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/11.png)
71-
**Fig 11:** Processing extracted Amcache.hve → XLSX
81+
![Amcache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/13.png)
82+
**Fig 13:** Processing extracted Amcache.hve → XLSX
7283

73-
![ShimCache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/12.png)
74-
**Fig 12:** Processing ShimCache → XLSX
84+
![ShimCache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/14.png)
85+
**Fig 14:** Processing ShimCache → XLSX
7586

76-
![Timeline-Explorer](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/14.png)
77-
**Fig 13:** Analyze CSV output w/ Timeline Explorer (TLE)
87+
![Timeline-Explorer](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/15.png)
88+
**Fig 15:** Analyze CSV output w/ Timeline Explorer (TLE)
7889

79-
![ELK-Import](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/13.png)
80-
**Fig 14:** ELK Import
90+
![ELK-Import](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/16.png)
91+
**Fig 16:** ELK Import
8192

82-
![ELK-Timeline](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/15.png)
83-
**Fig 15:** Happy ELK Hunting!
93+
![ELK-Timeline](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/17.png)
94+
**Fig 17:** Happy ELK Hunting!
8495

85-
![Secure-Archive-Container](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/16.png)
86-
**Fig 16:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
96+
![Secure-Archive-Container](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/18.png)
97+
**Fig 18:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
8798

88-
![Message-Box](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/17.png)
89-
**Fig 17:** Press **OK** to shutdown MemProcFS and Elastisearch/Kibana
99+
![Message-Box](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/19.png)
100+
**Fig 19:** Press **OK** to shutdown MemProcFS and Elastisearch/Kibana
90101

91-
![Output](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/18.png)
92-
**Fig 18:** Secure Archive Container (PW: MemProcFS)
102+
![Output](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/20.png)
103+
**Fig 20:** Secure Archive Container (PW: MemProcFS)
93104

94105
## Introduction MemProcFS and Memory Forensics
95106
Check out [Super Easy Memory Forensics](https://www.slideshare.net/IIJ_PR/super-easy-memory-forensics) by [Hiroshi Suzuki](https://twitter.com/herosi_t) and [Hisao Nashiwa](https://twitter.com/unk0unk0).
@@ -130,7 +141,7 @@ Notes:
130141
- [Elasticsearch Tips](https://github.com/evild3ad/MemProcFS-Analyzer/wiki/Elasticsearch)
131142

132143
## Dependencies
133-
7-Zip 22.00 Standalone Console (2022-06-15)
144+
7-Zip 22.01 Standalone Console (2022-07-15)
134145
https://www.7-zip.org/download.html
135146

136147
AmcacheParser v1.5.1.0 (.NET 6)
@@ -139,28 +150,34 @@ https://ericzimmerman.github.io/
139150
AppCompatCacheParser v1.5.0.0 (.NET 6)
140151
https://ericzimmerman.github.io/
141152

142-
ClamAV - Alternate Versions → Windows Packages → Win64 → clamav-0.105.0.win.x64.msi (2022-05-03)
153+
ClamAV - Download → Alternate Versions → Windows Packages → Win64 → clamav-0.105.1.win.x64.msi (2022-07-26)
143154
https://www.clamav.net/downloads#otherversions
144155

145156
Dokany Library Bundle v2.0.5.1000 (2022-07-04)
146157
https://github.com/dokan-dev/dokany/releases/latest → DokanSetup.exe
147158

148-
Elasticsearch 8.3.1 (2022-06-30)
159+
Elasticsearch 8.4.1 (2022-08-30)
149160
https://www.elastic.co/downloads/elasticsearch
150161

162+
entropy v1.0 (2022-02-04)
163+
https://github.com/merces/entropy
164+
151165
EvtxECmd v1.0.0.0 (.NET 6)
152166
https://ericzimmerman.github.io/
153167

154-
ImportExcel 7.7.0 (2022-07-04)
168+
ImportExcel 7.8.1 (2022-09-03)
155169
https://github.com/dfinke/ImportExcel
156170

157-
Ipinfo CLI 2.8.0 (2022-03-21)
171+
Ipinfo CLI 2.8.1 (2022-05-23)
158172
https://github.com/ipinfo/cli
159173

160-
Kibana 8.3.1 (2022-06-30)
174+
Kibana 8.4.1 (2022-08-30)
161175
https://www.elastic.co/downloads/kibana
162176

163-
MemProcFS v4.9.3 - The Memory Process File System (2022-06-15)
177+
lnk_parser v0.2.0 (2022-08-10)
178+
https://github.com/AbdulRhmanAlfaifi/lnk_parser
179+
180+
MemProcFS v5.0.3 - The Memory Process File System (2022-08-04)
164181
https://github.com/ufrisk/MemProcFS
165182

166183
RECmd v2.0.0.0 (.NET 6)
@@ -170,7 +187,10 @@ SBECmd v2.0.0.0 (.NET 6)
170187
https://ericzimmerman.github.io/
171188

172189
xsv v0.13.0 (2018-05-12)
173-
https://github.com/BurntSushi/xsv
190+
https://github.com/BurntSushi/xsv
191+
192+
YARA v4.2.3 (2022-08-09)
193+
https://virustotal.github.io/yara/
174194

175195
## Links
176196
[MemProcFS](https://github.com/ufrisk/MemProcFS)

0 commit comments

Comments
 (0)