@@ -7,11 +7,12 @@ https://github.com/ufrisk/MemProcFS
77Features:
88* Fast and easy memory analysis!
99* You can mount a Raw Physical Memory Dump like a disk image and handle the memory compression feature on Windows
10- * Auto-Install of MemProcFS, Elasticsearch, Kibana , EvtxECmd, AmcacheParser, AppCompatCacheParser, RECmd, SBECmd, ImportExcel, IPinfo CLI , and xsv
11- * Auto-Update of MemProcFS, Elasticsearch, Kibana, ClamAV Virus Databases (CVD) , EvtxECmd (incl. Maps), AmcacheParser, AppCompactCacheParser, RECmd, SBECmd, Import-Excel, IPinfo CLI , and xsv
10+ * Auto-Install of MemProcFS, AmcacheParser, AppCompatCacheParser, Elasticsearch, entropy , EvtxECmd, ImportExcel, IPinfo CLI, Kibana, lnk_parser, RECmd, SBECmd, xsv , and YARA
11+ * Auto-Update of MemProcFS, AmcacheParser, AppCompatCacheParser, Elasticsearch, entropy , EvtxECmd (incl. Maps), ImportExcel, IPinfo CLI, Kibana, lnk_parser, RECmd, SBECmd, xsv , and YARA
1212* Update-Info when there's a new version of ClamAV or a new Dokany File System Library Bundle available
13- * Multi-Threaded scan w/ ClamAV for Windows
1413* OS Fingerprinting
14+ * Multi-Threaded scan w/ ClamAV for Windows
15+ * Collection of infected files detected by ClamAV for further analysis (PW: infected)
1516* Collection of injected modules detected by MemProcFS PE_INJECT for further analysis (PW: infected)
1617* Extracting IPv4/IPv6
1718* IP2ASN Mapping and GeoIP w/ [ IPinfo CLI] ( https://github.com/ipinfo/cli ) → ; Get your token for free at [ https://ipinfo.io/signup ] ( https://ipinfo.io/signup )
@@ -25,6 +26,10 @@ Features:
2526* Analyzing ShellBags Artifacts w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
2627* Analyzing Auto-Start Extensibility Points (ASEPs) w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
2728* Analyzing RecentDocs, Office Trusted Document w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
29+ * Analyzing Registry w/ Kroll RECmd Batch File ([ Kroll Batch File] ( https://github.com/EricZimmerman/RECmd/projects/1 ) by Andrew Rathbun)
30+ * Analyzing Metadata of Recovered Process Modules (experimental)
31+ * Extracting Windows Shortcut Files (LNK)
32+ * Hunting Malicious Windows Shortcut Files (LNK)
2833* Integration of PowerShell module [ ImportExcel] ( https://github.com/dfinke/ImportExcel ) by Doug Finke
2934* CSV output data for analysis w/ Timeline Explorer (e.g. timeline-reverse.csv, findevil.csv, web.csv)
3035* Collecting Evidence Files (Secure Archive Container → ; PW: MemProcFS)
@@ -35,61 +40,67 @@ Download the latest version of **MemProcFS-Analyzer** from the [Releases](https:
3540## Usage
3641Launch Windows PowerShell (or Windows PowerShell ISE or Visual Studio Code w/ PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
3742
38- ![ File-Browser] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/01.png )
43+ ![ File-Browser] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/01.png )
3944** Fig 1:** Select your Raw Physical Memory Dump (File Browser)
4045
41- ![ Auto-Install] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/02.png )
46+ ![ Auto-Install] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/02.png )
4247** Fig 2:** MemProcFS-Analyzer auto-installs dependencies (First Run)
4348
44- ![ Microsoft-Internet-Symbol-Store] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/03.png )
49+ ![ Microsoft-Internet-Symbol-Store] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/03.png )
4550** Fig 3:** Accept Terms of Use (First Run)
4651
47- ![ MemProcFS] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/04.png )
52+ ![ MemProcFS] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/04.png )
4853** Fig 4:** If you find MemProcFS useful, please become a sponsor at: https://github.com/sponsors/ufrisk
4954
50- ![ Mounted] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/05.png )
55+ ![ Mounted] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/05.png )
5156** Fig 5:** You can investigate the mounted memory dump by exploring drive letter X:
5257
53- ![ Auto-Update] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/06.png )
58+ ![ Auto-Update] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/06.png )
5459** Fig 6:** MemProcFS-Analyzer checks for updates (Second Run)
5560
5661Note: It's recommended to uncomment/disable the "Updater" function after installation. Check out the "Main" in the bottom of the script.
5762
58- ![ ClamAV-Scan] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/07.png )
63+ ![ ClamAV-Scan] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/07.png )
5964** Fig 7:** FindEvil feature and additional analytics
6065
61- ![ IPinfo] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/08.png )
62- ** Fig 8:** GeoIP w/ IPinfo.io
66+ ![ Processes] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/08.png )
67+ ** Fig 8:** Processes
68+
69+ ![ RunningAndExited] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/09.png )
70+ ** Fig 9:** Running and Exited Processes
71+
72+ ![ IPinfo] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/10.png )
73+ ** Fig 10:** GeoIP w/ IPinfo.io
6374
64- ![ IPinfo ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/09 .png )
65- ** Fig 9 :** Map IPs w/ IPinfo.io
75+ ![ MapReport ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/11 .png )
76+ ** Fig 11 :** Map IPs w/ IPinfo.io
6677
67- ![ Elasticsearch ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/10 .png )
68- ** Fig 10 :** Processing Windows Event Logs (EVTX)
78+ ![ EVTX ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/12 .png )
79+ ** Fig 12 :** Processing Windows Event Logs (EVTX)
6980
70- ![ Amcache] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/11 .png )
71- ** Fig 11 :** Processing extracted Amcache.hve → ; XLSX
81+ ![ Amcache] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/13 .png )
82+ ** Fig 13 :** Processing extracted Amcache.hve → ; XLSX
7283
73- ![ ShimCache] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/12 .png )
74- ** Fig 12 :** Processing ShimCache → ; XLSX
84+ ![ ShimCache] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/14 .png )
85+ ** Fig 14 :** Processing ShimCache → ; XLSX
7586
76- ![ Timeline-Explorer] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/14 .png )
77- ** Fig 13 :** Analyze CSV output w/ Timeline Explorer (TLE)
87+ ![ Timeline-Explorer] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/15 .png )
88+ ** Fig 15 :** Analyze CSV output w/ Timeline Explorer (TLE)
7889
79- ![ ELK-Import] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/13 .png )
80- ** Fig 14 :** ELK Import
90+ ![ ELK-Import] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/16 .png )
91+ ** Fig 16 :** ELK Import
8192
82- ![ ELK-Timeline] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/15 .png )
83- ** Fig 15 :** Happy ELK Hunting!
93+ ![ ELK-Timeline] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/17 .png )
94+ ** Fig 17 :** Happy ELK Hunting!
8495
85- ![ Secure-Archive-Container] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/16 .png )
86- ** Fig 16 :** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
96+ ![ Secure-Archive-Container] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/18 .png )
97+ ** Fig 18 :** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
8798
88- ![ Message-Box] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/17 .png )
89- ** Fig 17 :** Press ** OK** to shutdown MemProcFS and Elastisearch/Kibana
99+ ![ Message-Box] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/19 .png )
100+ ** Fig 19 :** Press ** OK** to shutdown MemProcFS and Elastisearch/Kibana
90101
91- ![ Output] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/18 .png )
92- ** Fig 18 :** Secure Archive Container (PW: MemProcFS)
102+ ![ Output] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae /Screenshots/20 .png )
103+ ** Fig 20 :** Secure Archive Container (PW: MemProcFS)
93104
94105## Introduction MemProcFS and Memory Forensics
95106Check out [ Super Easy Memory Forensics] ( https://www.slideshare.net/IIJ_PR/super-easy-memory-forensics ) by [ Hiroshi Suzuki] ( https://twitter.com/herosi_t ) and [ Hisao Nashiwa] ( https://twitter.com/unk0unk0 ) .
@@ -130,7 +141,7 @@ Notes:
130141- [ Elasticsearch Tips] ( https://github.com/evild3ad/MemProcFS-Analyzer/wiki/Elasticsearch )
131142
132143## Dependencies
133- 7-Zip 22.00 Standalone Console (2022-06 -15)
144+ 7-Zip 22.01 Standalone Console (2022-07 -15)
134145https://www.7-zip.org/download.html
135146
136147AmcacheParser v1.5.1.0 (.NET 6)
@@ -139,28 +150,34 @@ https://ericzimmerman.github.io/
139150AppCompatCacheParser v1.5.0.0 (.NET 6)
140151https://ericzimmerman.github.io/
141152
142- ClamAV - Alternate Versions → ; Windows Packages → ; Win64 → ; clamav-0.105.0 .win.x64.msi (2022-05-03 )
153+ ClamAV - Download &# 8594 ; Alternate Versions → ; Windows Packages → ; Win64 → ; clamav-0.105.1 .win.x64.msi (2022-07-26 )
143154https://www.clamav.net/downloads#otherversions
144155
145156Dokany Library Bundle v2.0.5.1000 (2022-07-04)
146157https://github.com/dokan-dev/dokany/releases/latest → ; DokanSetup.exe
147158
148- Elasticsearch 8.3 .1 (2022-06 -30)
159+ Elasticsearch 8.4 .1 (2022-08 -30)
149160https://www.elastic.co/downloads/elasticsearch
150161
162+ entropy v1.0 (2022-02-04)
163+ https://github.com/merces/entropy
164+
151165EvtxECmd v1.0.0.0 (.NET 6)
152166https://ericzimmerman.github.io/
153167
154- ImportExcel 7.7.0 (2022-07-04 )
168+ ImportExcel 7.8.1 (2022-09-03 )
155169https://github.com/dfinke/ImportExcel
156170
157- Ipinfo CLI 2.8.0 (2022-03-21 )
171+ Ipinfo CLI 2.8.1 (2022-05-23 )
158172https://github.com/ipinfo/cli
159173
160- Kibana 8.3 .1 (2022-06 -30)
174+ Kibana 8.4 .1 (2022-08 -30)
161175https://www.elastic.co/downloads/kibana
162176
163- MemProcFS v4.9.3 - The Memory Process File System (2022-06-15)
177+ lnk_parser v0.2.0 (2022-08-10)
178+ https://github.com/AbdulRhmanAlfaifi/lnk_parser
179+
180+ MemProcFS v5.0.3 - The Memory Process File System (2022-08-04)
164181https://github.com/ufrisk/MemProcFS
165182
166183RECmd v2.0.0.0 (.NET 6)
@@ -170,7 +187,10 @@ SBECmd v2.0.0.0 (.NET 6)
170187https://ericzimmerman.github.io/
171188
172189xsv v0.13.0 (2018-05-12)
173- https://github.com/BurntSushi/xsv
190+ https://github.com/BurntSushi/xsv
191+
192+ YARA v4.2.3 (2022-08-09)
193+ https://virustotal.github.io/yara/
174194
175195## Links
176196[ MemProcFS] ( https://github.com/ufrisk/MemProcFS )
0 commit comments