Skip to content

Commit eced7ce

Browse files
authored
Update README.md
1 parent 7e190fc commit eced7ce

File tree

1 file changed

+87
-69
lines changed

1 file changed

+87
-69
lines changed

README.md

Lines changed: 87 additions & 69 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,32 @@
11
# MemProcFS-Analyzer
22
MemProcFS-Analyzer.ps1 is a PowerShell script utilized to simplify the usage of MemProcFS and to assist with the memory analysis workflow.
33

4-
MemProcFS - The Memory Process File System by Ulf Frisk
4+
MemProcFS - The Memory Process File System by [Ulf Frisk](https://twitter.com/ulffrisk)
55
https://github.com/ufrisk/MemProcFS
66

77
Features:
8-
* Auto-Install of MemProcFS, Elasticsearch, Kibana, EvtxECmd, AmcacheParser, AppCompatCacheParser, RECmd, SBECmd, ImportExcel, and IPinfo CLI
9-
* Auto-Update of MemProcFS, Elasticsearch, Kibana, ClamAV Virus Databases (CVD), EvtxECmd (incl. Maps), AmcacheParser, AppCompactCacheParser, RECmd, SBECmd, Import-Excel, and IPinfo CLI
10-
* Update-Info when there's a new version of ClamAV or a new Redistributable packaged Dokany Library Bundle available
8+
* Fast and easy memory analysis!
9+
* You can mount a Raw Physical Memory Dump like a disk image and handle the memory compression feature on Windows
10+
* Auto-Install of MemProcFS, Elasticsearch, Kibana, EvtxECmd, AmcacheParser, AppCompatCacheParser, RECmd, SBECmd, ImportExcel, IPinfo CLI, and xsv
11+
* Auto-Update of MemProcFS, Elasticsearch, Kibana, ClamAV Virus Databases (CVD), EvtxECmd (incl. Maps), AmcacheParser, AppCompactCacheParser, RECmd, SBECmd, Import-Excel, IPinfo CLI, and xsv
12+
* Update-Info when there's a new version of ClamAV or a new Dokany File System Library Bundle available
1113
* Multi-Threaded scan w/ ClamAV for Windows
1214
* OS Fingerprinting
1315
* Collection of injected modules detected by MemProcFS PE_INJECT for further analysis (PW: infected)
1416
* Extracting IPv4/IPv6
15-
* IP2ASN Mapping and GeoIP w/ [IPinfo CLI](https://github.com/ipinfo/cli)
16-
* Checking for Unusual Parent-Child Relationships and Number of Instances
17+
* IP2ASN Mapping and GeoIP w/ [IPinfo CLI](https://github.com/ipinfo/cli) → Get your token for free at [https://ipinfo.io/signup](https://ipinfo.io/signup)
18+
* Checking Processes for Unusual Parent-Child Relationships and Number of Instances
19+
* Web Browser History (Google Chrome, Microsoft Edge and Firefox)
1720
* Extracting Windows Event Log Files and processing w/ EvtxECmd → Timeline Explorer ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
1821
* Analyzing extracted Amcache.hve w/ Amcacheparser ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
1922
* Analyzing Application Compatibility Cache aka ShimCache w/ AppCompatcacheParser ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
2023
* Analyzing Syscache w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
2124
* Analyzing UserAssist Artifacts w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
2225
* Analyzing ShellBags Artifacts w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
23-
* Extracting Auto-Start Extensibility Points (ASEPs) w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
26+
* Analyzing Auto-Start Extensibility Points (ASEPs) w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
27+
* Analyzing RecentDocs, Office Trusted Document w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
2428
* Integration of PowerShell module [ImportExcel](https://github.com/dfinke/ImportExcel) by Doug Finke
29+
* CSV output data for analysis w/ Timeline Explorer (e.g. timeline-reverse.csv, findevil.csv, web.csv)
2530
* Collecting Evidence Files (Secure Archive Container → PW: MemProcFS)
2631

2732
## Download
@@ -30,129 +35,142 @@ Download the latest version of **MemProcFS-Analyzer** from the [Releases](https:
3035
## Usage
3136
Launch Windows PowerShell (or Windows PowerShell ISE or Visual Studio Code w/ PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
3237

33-
![File-Browser](https://github.com/evild3ad/MemProcFS-Analyzer/blob/195b43a37a11e58998d03213717f70e22c6bae54/Screenshots/01.png)
38+
![File-Browser](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/01.png)
3439
**Fig 1:** Select your Raw Physical Memory Dump (File Browser)
3540

36-
![Auto-Install](https://github.com/evild3ad/MemProcFS-Analyzer/blob/195b43a37a11e58998d03213717f70e22c6bae54/Screenshots/02.png)
41+
![Auto-Install](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/02.png)
3742
**Fig 2:** MemProcFS-Analyzer auto-installs dependencies (First Run)
3843

39-
![Microsoft-Internet-Symbol-Store](https://github.com/evild3ad/MemProcFS-Analyzer/blob/195b43a37a11e58998d03213717f70e22c6bae54/Screenshots/03.png)
44+
![Microsoft-Internet-Symbol-Store](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/03.png)
4045
**Fig 3:** Accept Terms of Use (First Run)
4146

42-
![MemProcFS](https://github.com/evild3ad/MemProcFS-Analyzer/blob/195b43a37a11e58998d03213717f70e22c6bae54/Screenshots/04.png)
47+
![MemProcFS](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/04.png)
4348
**Fig 4:** If you find MemProcFS useful, please become a sponsor at: https://github.com/sponsors/ufrisk
4449

45-
![Auto-Update](https://github.com/evild3ad/MemProcFS-Analyzer/blob/195b43a37a11e58998d03213717f70e22c6bae54/Screenshots/05.png)
46-
**Fig 5:** MemProcFS-Analyzer checks for updates (Second Run)
50+
![Mounted](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/05.png)
51+
**Fig 5:** You can investigate the mounted memory dump by exploring drive letter X:
4752

48-
![ClamAV-Scan](https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/06.png)
49-
**Fig 6:** Multi-Threaded ClamAV Scan
53+
![Auto-Update](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/06.png)
54+
**Fig 6:** MemProcFS-Analyzer checks for updates (Second Run)
5055

51-
![IPinfo](https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/07.png)
52-
**Fig 7:** GeoIP w/ IPinfo.io
56+
Note: It's recommended to uncomment/disable the "Updater" function after installation. Check out the "Main" in the bottom of the script.
5357

54-
![IPinfo](https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/08.png)
55-
**Fig 8:** Map IPs w/ IPinfo.io
58+
![ClamAV-Scan](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/07.png)
59+
**Fig 7:** FindEvil feature and additional analytics
5660

57-
![Elasticsearch](https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/09.png)
58-
**Fig 9:** Processing Windows Event Logs (EVTX)
61+
![IPinfo](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/08.png)
62+
**Fig 8:** GeoIP w/ IPinfo.io
5963

60-
![Amcache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/10.png)
61-
**Fig 10:** Processing extracted Amcache.hve → XLSX
64+
![IPinfo](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/09.png)
65+
**Fig 9:** Map IPs w/ IPinfo.io
6266

63-
![ShimCache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/11.png)
64-
**Fig 11:** Processing ShimCache → XLSX
67+
![Elasticsearch](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/10.png)
68+
**Fig 10:** Processing Windows Event Logs (EVTX)
6569

66-
![ELK-Import](https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/12.png)
67-
**Fig 12:** ELK Import
70+
![Amcache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/11.png)
71+
**Fig 11:** Processing extracted Amcache.hve → XLSX
6872

69-
![ELK-Timeline](https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/13.png)
70-
**Fig 13:** Happy ELK Hunting!
73+
![ShimCache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/12.png)
74+
**Fig 12:** Processing ShimCache → XLSX
7175

72-
![Secure-Archive-Container](https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/14.png)
73-
**Fig 14:** ClamAV Scan found 29 infected file(s)
76+
![Timeline-Explorer](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/14.png)
77+
**Fig 13:** Analyze CSV output w/ Timeline Explorer (TLE)
7478

75-
![Message-Box](https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/15.png)
76-
**Fig 15:** Press **OK** to shutdown MemProcFS and Elastisearch/Kibana
79+
![ELK-Import](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/13.png)
80+
**Fig 14:** ELK Import
7781

78-
![Output](https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/16.png)
79-
**Fig 16:** Secure Archive Container (PW: MemProcFS)
82+
![ELK-Timeline](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/15.png)
83+
**Fig 15:** Happy ELK Hunting!
84+
85+
![Secure-Archive-Container](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/16.png)
86+
**Fig 16:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
87+
88+
![Message-Box](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/17.png)
89+
**Fig 17:** Press **OK** to shutdown MemProcFS and Elastisearch/Kibana
90+
91+
![Output](https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/18.png)
92+
**Fig 18:** Secure Archive Container (PW: MemProcFS)
93+
94+
## Introduction MemProcFS and Memory Forensics
95+
Check out [Super Easy Memory Forensics](https://www.slideshare.net/IIJ_PR/super-easy-memory-forensics) by [Hiroshi Suzuki](https://twitter.com/herosi_t) and [Hisao Nashiwa](https://twitter.com/unk0unk0).
8096

8197
## Prerequisites
82-
1. Download and install the latest Dokany Library Bundle (Redistributable packaged) → DokanSetup_redist.exe
83-
The Dokany installer will also install the required Microsoft Visual C++ Redistributables for Visual Studio 2019.
98+
1. Download and install the latest Dokany Library Bundle → DokanSetup.exe
8499
https://github.com/dokan-dev/dokany/releases/latest
85100

86-
2. Download and install the latest Windows package of ClamAV.
87-
https://www.clamav.net/downloads
101+
2. Download and install the latest .NET 6 Desktop Runtime (Requirement for [EZTools](https://ericzimmerman.github.io/))
102+
https://dotnet.microsoft.com/en-us/download/dotnet/6.0
103+
104+
3. Download and install the latest Windows package of ClamAV.
105+
https://www.clamav.net/downloads#otherversions
88106

89-
3. First Time Set-Up of ClamAV
107+
4. First Time Set-Up of ClamAV
90108
Launch Windows PowerShell console as Administrator.
91109
`cd "C:\Program Files\clamav"`
92110
`copy .\conf_examples\freshclam.conf.sample .\freshclam.conf`
93111
`copy .\conf_examples\clamd.conf.sample .\clamd.conf`
94112
`write.exe .\freshclam.conf` → Comment or remove the line that says “Example”.
95113
`write.exe .\clamd.conf` → Comment or remove the line that says “Example”.
96-
https://www.clamav.net/documents/installing-clamav-on-windows
114+
https://docs.clamav.net/manual/Usage/Configuration.html#windows
97115

98-
4. Create your free IPinfo account [approx. 1-2 min]
116+
5. Create your free IPinfo account [approx. 1-2 min]
99117
https://ipinfo.io/signup?ref=cli
100-
Open "MemProcFS-Analyzer.ps1" with your text editor, search for "access_token" and copy/paste your access token.
118+
Open "MemProcFS-Analyzer.ps1" with your text editor, search for "<access_token>" and copy/paste your access token.
101119

102-
5. Install the NuGet package provider for PowerShell
120+
6. Install the NuGet package provider for PowerShell
103121
Check if NuGet is available in the package providers by running the following command:
104122
`Get-PackageProvider -ListAvailable`
105123
If NuGet is not installed on your system yet, you have to install it.
106124
`Install-PackageProvider -Name NuGet -Force`
107125

108-
6. Done! :smiley:
126+
7. Done! :smiley:
109127

110128
## Dependencies
111-
7-Zip 9.20 Command Line Version (2010-11-18)
129+
7-Zip 22.00 Standalone Console (2022-06-15)
112130
https://www.7-zip.org/download.html
113131

114-
AmcacheParser v1.4.0.0 (2021-03-20)
115-
https://binaryforay.blogspot.com/
132+
AmcacheParser v1.5.1.0 (.NET 6)
133+
https://ericzimmerman.github.io/
116134

117-
AppCompatCacheParser v1.4.4.0 (2021-03-20)
118-
https://binaryforay.blogspot.com/
135+
AppCompatCacheParser v1.5.0.0 (.NET 6)
136+
https://ericzimmerman.github.io/
119137

120-
ClamAV - Windows Packages &#8594; Win64 &#8594; ClamAV-0.103.2.exe (2021-04-07)
121-
https://www.clamav.net/downloads
122-
https://www.clamav.net/documents/installing-clamav-on-windows &#8594; First Time Set-Up
138+
ClamAV - Alternate Versions &#8594; Windows Packages &#8594; Win64 &#8594; clamav-0.105.0.win.x64.msi (2022-05-03)
139+
https://www.clamav.net/downloads#otherversions
123140

124-
Dokany Library Bundle v1.4.0.1000 x64 (2020-06-01)
125-
https://github.com/dokan-dev/dokany/releases/latest &#8594; DokanSetup_redist.exe
141+
Dokany Library Bundle v2.0.5.1000 (2022-07-04)
142+
https://github.com/dokan-dev/dokany/releases/latest &#8594; DokanSetup.exe
126143

127-
Elasticsearch 7.13.2 (2021-06-14)
144+
Elasticsearch 8.3.1 (2022-06-30)
128145
https://www.elastic.co/downloads/elasticsearch
129146

130-
EvtxECmd v0.6.5.0 (2020-12-21)
131-
https://binaryforay.blogspot.com/
147+
EvtxECmd v1.0.0.0 (.NET 6)
148+
https://ericzimmerman.github.io/
132149

133-
ImportExcel 7.1.2 (2020-05-08)
150+
ImportExcel 7.7.0 (2022-07-04)
134151
https://github.com/dfinke/ImportExcel
135152

136-
Ipinfo CLI 2.0.0 (2021-05-26)
153+
Ipinfo CLI 2.8.0 (2022-03-21)
137154
https://github.com/ipinfo/cli
138155

139-
Kibana 7.13.2 (2021-06-14)
156+
Kibana 8.3.1 (2022-06-30)
140157
https://www.elastic.co/downloads/kibana
141158

142-
MemProcFS v4.1.0 - The Memory Process File System (2021-06-13)
159+
MemProcFS v4.9.3 - The Memory Process File System (2022-06-15)
143160
https://github.com/ufrisk/MemProcFS
144161

145-
Microsoft Visual C++ Redistributables for Visual Studio 2019
146-
https://go.microsoft.com/fwlink/?LinkId=746572 &#8594; VC_redist.x64.exe
162+
RECmd v2.0.0.0 (.NET 6)
163+
https://ericzimmerman.github.io/
147164

148-
Registry Explorer/RECmd v1.6.0.0 (2021-06-08)
149-
https://binaryforay.blogspot.com/
165+
SBECmd v2.0.0.0 (.NET 6)
166+
https://ericzimmerman.github.io/
150167

151-
ShellBags Explorer v1.4.0.0 (2021-05-24)
152-
https://binaryforay.blogspot.com/
168+
xsv v0.13.0 (2018-05-12)
169+
https://github.com/BurntSushi/xsv
153170

154171
## Links
155172
[MemProcFS](https://github.com/ufrisk/MemProcFS)
156173
[Demo of MemProcFS with Elasticsearch](https://www.youtube.com/watch?v=JcIlowlrvyI)
157-
[Sponsor MemProcFS project](https://github.com/sponsors/ufrisk)
174+
[Sponsor MemProcFS Project](https://github.com/sponsors/ufrisk)
158175
[MemProcFSHunter](https://github.com/memprocfshunt/MemProcFSHunter)
176+
[MemProcFS-Plugins](https://github.com/ufrisk/MemProcFS-Plugins)

0 commit comments

Comments
 (0)