Skip to content

Commit dce6724

Browse files
committed
2024-09-03
1 parent eca150f commit dce6724

File tree

8 files changed

+3484
-2049
lines changed

8 files changed

+3484
-2049
lines changed

MemProcFS-Analyzer.ps1

Lines changed: 859 additions & 1903 deletions
Large diffs are not rendered by default.

README.md

Lines changed: 25 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Features:
1414
* Update-Info when there's a new version of ClamAV or a new Dokany File System Library Bundle available
1515
* Pagefile Support
1616
* OS Fingerprinting
17-
* Scan w/ Custom YARA rules (incl. 318 rules by e.g. [Chronicle](https://github.com/chronicle/GCTI/tree/main/YARA) and [Elastic Security](https://github.com/elastic/protections-artifacts))
17+
* Scan w/ Custom YARA rules (incl. 376 rules by e.g. [Chronicle](https://github.com/chronicle/GCTI/tree/main/YARA) and [Elastic Security](https://github.com/elastic/protections-artifacts))
1818
* Multi-Threaded scan w/ ClamAV for Windows
1919
* Collection of infected files detected by ClamAV for further analysis (PW: infected)
2020
* Collection of injected modules detected by MemProcFS PE_INJECT for further analysis (PW: infected)
@@ -39,11 +39,13 @@ Features:
3939
* Analyzing RecentDocs, Office Trusted Document w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
4040
* Analyzing Registry w/ Kroll RECmd Batch File ([Kroll Batch File](https://github.com/EricZimmerman/RECmd/projects/1) by Andrew Rathbun)
4141
* Analyzing Metadata of Recovered Process Modules (experimental)
42+
* Analyzing Microsoft Protection Logs (experimental)
4243
* Extracting Windows Shortcut Files (LNK)
4344
* Hunting Malicious Windows Shortcut Files (LNK)
4445
* Integration of PowerShell module [ImportExcel](https://github.com/dfinke/ImportExcel) by Doug Finke
4546
* CSV output data for analysis w/ Timeline Explorer (e.g. timeline-reverse.csv, findevil.csv, web.csv)
4647
* Collecting Evidence Files (Secure Archive Container → PW: MemProcFS)
48+
* Offline-Mode
4749
* and much more
4850

4951
## Download
@@ -52,25 +54,23 @@ Download the latest version of **MemProcFS-Analyzer** from the [Releases](https:
5254
## Usage
5355
Launch Windows PowerShell (or Windows PowerShell ISE or Visual Studio Code w/ PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
5456

55-
![File-Browser](https://github.com/evild3ad/MemProcFS-Analyzer/blob/0780ec4a5fc62219e12791456f5f1e38d5b10b1a/Screenshots/01.png)
56-
**Fig 1:** Select your Memory Snapshot and select your pagefile.sys (Optional)
57+
![First-Run](https://github.com/evild3ad/MemProcFS-Analyzer/blob/0780ec4a5fc62219e12791456f5f1e38d5b10b1a/Screenshots/01.png)
58+
**Fig 1:** MemProcFS-Analyzer.ps1 (First Run) → Updater.ps1
59+
60+
![Updater](https://github.com/evild3ad/MemProcFS-Analyzer/blob/0780ec4a5fc62219e12791456f5f1e38d5b10b1a/Screenshots/01.png)
61+
**Fig 2:** Updater.ps1 automatically installs/updates all dependencies (First Run)
5762

58-
![Auto-Install](https://github.com/evild3ad/MemProcFS-Analyzer/blob/0780ec4a5fc62219e12791456f5f1e38d5b10b1a/Screenshots/02.png)
59-
**Fig 2:** MemProcFS-Analyzer auto-installs dependencies (First Run)
63+
![File-Browser](https://github.com/evild3ad/MemProcFS-Analyzer/blob/0780ec4a5fc62219e12791456f5f1e38d5b10b1a/Screenshots/01.png)
64+
**Fig 3:** Select your Memory Snapshot and select your pagefile.sys (Optional)
6065

6166
![Microsoft-Internet-Symbol-Store](https://github.com/evild3ad/MemProcFS-Analyzer/blob/0780ec4a5fc62219e12791456f5f1e38d5b10b1a/Screenshots/03.png)
62-
**Fig 3:** Accept Terms of Use (First Run)
67+
**Fig 4:** Accept Terms of Use (First Run)
6368

6469
![MemProcFS](https://github.com/evild3ad/MemProcFS-Analyzer/blob/0780ec4a5fc62219e12791456f5f1e38d5b10b1a/Screenshots/04.png)
65-
**Fig 4:** If you find MemProcFS useful, please become a sponsor at: https://github.com/sponsors/ufrisk
66-
67-
![Mounted](https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2/Screenshots/05.png)
68-
**Fig 5:** You can investigate the mounted memory dump by exploring drive letter
69-
70-
![Auto-Update](https://github.com/evild3ad/MemProcFS-Analyzer/blob/0780ec4a5fc62219e12791456f5f1e38d5b10b1a/Screenshots/06.png)
71-
**Fig 6:** MemProcFS-Analyzer checks for updates (Second Run)
70+
**Fig 5:** If you find MemProcFS useful, please become a sponsor at: https://github.com/sponsors/ufrisk
7271

73-
Note: It's recommended to uncomment/disable the "Updater" function after installation. Check out the "Main" in the bottom of the script.
72+
![MountPoint](https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2/Screenshots/05.png)
73+
**Fig 6:** You can investigate the mounted memory dump by exploring drive letter
7474

7575
![FindEvil](https://github.com/evild3ad/MemProcFS-Analyzer/blob/0780ec4a5fc62219e12791456f5f1e38d5b10b1a/Screenshots/07.png)
7676
**Fig 7:** FindEvil feature and additional analytics
@@ -177,7 +177,7 @@ Notes:
177177
- [Elasticsearch Tips](https://github.com/evild3ad/MemProcFS-Analyzer/wiki/Elasticsearch)
178178

179179
## Dependencies
180-
7-Zip 23.01 Standalone Console (2023-06-20)
180+
7-Zip 24.08 Standalone Console (2024-08-11)
181181
https://www.7-zip.org/download.html
182182

183183
AmcacheParser v1.5.1.0 (.NET 6)
@@ -186,13 +186,13 @@ https://ericzimmerman.github.io/
186186
AppCompatCacheParser v1.5.0.0 (.NET 6)
187187
https://ericzimmerman.github.io/
188188

189-
ClamAV - Download → Windows → clamav-1.2.0.win.x64.msi (2023-08-28)
189+
ClamAV - Download → Windows → clamav-1.4.0.win.x64.msi (2024-08-15)
190190
https://www.clamav.net/downloads
191191

192-
Dokany Library Bundle v2.0.6.1000 (2022-10-02)
192+
Dokany File System Library v2.2.0.1000 (2024-08-18)
193193
https://github.com/dokan-dev/dokany/releases/latest → DokanSetup.exe
194194

195-
Elasticsearch 8.9.2 (2023-09-06)
195+
Elasticsearch 8.15.0 (2024-08-08)
196196
https://www.elastic.co/downloads/elasticsearch
197197

198198
entropy v1.1 (2023-07-28)
@@ -201,22 +201,22 @@ https://github.com/merces/entropy
201201
EvtxECmd v1.5.0.0 (.NET 6)
202202
https://ericzimmerman.github.io/
203203

204-
ImportExcel v7.8.6 (2023-10-12)
204+
ImportExcel v7.8.9 (2024-06-21)
205205
https://github.com/dfinke/ImportExcel
206206

207-
IPinfo CLI 3.1.1 (2023-10-02)
207+
IPinfo CLI 3.3.1 (2024-03-01)
208208
https://github.com/ipinfo/cli
209209

210-
jq v1.7 (2023-09-06)
210+
jq v1.7.1 (2023-12-13)
211211
https://github.com/stedolan/jq
212212

213-
Kibana 8.9.2 (2023-09-06)
213+
Kibana 8.15.0 (2024-08-08)
214214
https://www.elastic.co/downloads/kibana
215215

216216
lnk_parser v0.2.0 (2022-08-10)
217217
https://github.com/AbdulRhmanAlfaifi/lnk_parser
218218

219-
MemProcFS v5.8.17 - The Memory Process File System (2023-08-20)
219+
MemProcFS v5.11.4 - The Memory Process File System (2024-07-29)
220220
https://github.com/ufrisk/MemProcFS
221221

222222
RECmd v2.0.0.0 (.NET 6)
@@ -228,15 +228,14 @@ https://ericzimmerman.github.io/
228228
xsv v0.13.0 (2018-05-12)
229229
https://github.com/BurntSushi/xsv
230230

231-
YARA v4.3.1 (2023-04-21)
231+
YARA v4.5.1 (2024-05-25)
232232
https://virustotal.github.io/yara/
233233

234-
Zircolite v2.9.10 (2023-07-15)
234+
Zircolite v2.20.0 (2024-03-29)
235235
https://github.com/wagga40/Zircolite
236236

237237
## Links
238238
[MemProcFS](https://github.com/ufrisk/MemProcFS)
239239
[Demo of MemProcFS with Elasticsearch](https://www.youtube.com/watch?v=JcIlowlrvyI)
240240
[Sponsor MemProcFS Project](https://github.com/sponsors/ufrisk)
241241
[MemProcFS-Plugins](https://github.com/ufrisk/MemProcFS-Plugins)
242-
[SANS FOR532 - Enterprise Memory Forensics In-Depth](https://www.sans.org/cyber-security-courses/enterprise-memory-forensics-in-depth/)

0 commit comments

Comments
 (0)