11# MemProcFS-Analyzer
22MemProcFS-Analyzer.ps1 is a PowerShell script utilized to simplify the usage of MemProcFS and to assist with the memory analysis workflow.
33
4- MemProcFS - The Memory Process File System by Ulf Frisk
4+ MemProcFS - The Memory Process File System by [ Ulf Frisk] ( https://twitter.com/ulffrisk )
55https://github.com/ufrisk/MemProcFS
66
77Features:
8- * Auto-Install of MemProcFS, Elasticsearch, Kibana, EvtxECmd, AmcacheParser, AppCompatCacheParser, RECmd, SBECmd, ImportExcel, and IPinfo CLI
9- * Auto-Update of MemProcFS, Elasticsearch, Kibana, ClamAV Virus Databases (CVD), EvtxECmd (incl. Maps), AmcacheParser, AppCompactCacheParser, RECmd, SBECmd, Import-Excel, and IPinfo CLI
10- * Update-Info when there's a new version of ClamAV or a new Redistributable packaged Dokany Library Bundle available
8+ * Fast and easy memory analysis!
9+ * You can mount a Raw Physical Memory Dump like a disk image and handle the memory compression feature on Windows
10+ * Auto-Install of MemProcFS, Elasticsearch, Kibana, EvtxECmd, AmcacheParser, AppCompatCacheParser, RECmd, SBECmd, ImportExcel, IPinfo CLI, and xsv
11+ * Auto-Update of MemProcFS, Elasticsearch, Kibana, ClamAV Virus Databases (CVD), EvtxECmd (incl. Maps), AmcacheParser, AppCompactCacheParser, RECmd, SBECmd, Import-Excel, IPinfo CLI, and xsv
12+ * Update-Info when there's a new version of ClamAV or a new Dokany File System Library Bundle available
1113* Multi-Threaded scan w/ ClamAV for Windows
1214* OS Fingerprinting
1315* Collection of injected modules detected by MemProcFS PE_INJECT for further analysis (PW: infected)
1416* Extracting IPv4/IPv6
15- * IP2ASN Mapping and GeoIP w/ [ IPinfo CLI] ( https://github.com/ipinfo/cli )
16- * Checking for Unusual Parent-Child Relationships and Number of Instances
17+ * IP2ASN Mapping and GeoIP w/ [ IPinfo CLI] ( https://github.com/ipinfo/cli ) → ; Get your token for free at [ https://ipinfo.io/signup ] ( https://ipinfo.io/signup )
18+ * Checking Processes for Unusual Parent-Child Relationships and Number of Instances
19+ * Web Browser History (Google Chrome, Microsoft Edge and Firefox)
1720* Extracting Windows Event Log Files and processing w/ EvtxECmd → ; Timeline Explorer ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
1821* Analyzing extracted Amcache.hve w/ Amcacheparser ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
1922* Analyzing Application Compatibility Cache aka ShimCache w/ AppCompatcacheParser ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
2023* Analyzing Syscache w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
2124* Analyzing UserAssist Artifacts w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
2225* Analyzing ShellBags Artifacts w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
23- * Extracting Auto-Start Extensibility Points (ASEPs) w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
26+ * Analyzing Auto-Start Extensibility Points (ASEPs) w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
27+ * Analyzing RecentDocs, Office Trusted Document w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
2428* Integration of PowerShell module [ ImportExcel] ( https://github.com/dfinke/ImportExcel ) by Doug Finke
29+ * CSV output data for analysis w/ Timeline Explorer (e.g. timeline-reverse.csv, findevil.csv, web.csv)
2530* Collecting Evidence Files (Secure Archive Container → ; PW: MemProcFS)
2631
2732## Download
@@ -30,129 +35,142 @@ Download the latest version of **MemProcFS-Analyzer** from the [Releases](https:
3035## Usage
3136Launch Windows PowerShell (or Windows PowerShell ISE or Visual Studio Code w/ PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
3237
33- ![ File-Browser] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/195b43a37a11e58998d03213717f70e22c6bae54 /Screenshots/01.png )
38+ ![ File-Browser] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/01.png )
3439** Fig 1:** Select your Raw Physical Memory Dump (File Browser)
3540
36- ![ Auto-Install] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/195b43a37a11e58998d03213717f70e22c6bae54 /Screenshots/02.png )
41+ ![ Auto-Install] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/02.png )
3742** Fig 2:** MemProcFS-Analyzer auto-installs dependencies (First Run)
3843
39- ![ Microsoft-Internet-Symbol-Store] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/195b43a37a11e58998d03213717f70e22c6bae54 /Screenshots/03.png )
44+ ![ Microsoft-Internet-Symbol-Store] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/03.png )
4045** Fig 3:** Accept Terms of Use (First Run)
4146
42- ![ MemProcFS] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/195b43a37a11e58998d03213717f70e22c6bae54 /Screenshots/04.png )
47+ ![ MemProcFS] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/04.png )
4348** Fig 4:** If you find MemProcFS useful, please become a sponsor at: https://github.com/sponsors/ufrisk
4449
45- ![ Auto-Update ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/195b43a37a11e58998d03213717f70e22c6bae54 /Screenshots/05.png )
46- ** Fig 5:** MemProcFS-Analyzer checks for updates (Second Run)
50+ ![ Mounted ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/05.png )
51+ ** Fig 5:** You can investigate the mounted memory dump by exploring drive letter X:
4752
48- ![ ClamAV-Scan ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231 /Screenshots/06.png )
49- ** Fig 6:** Multi-Threaded ClamAV Scan
53+ ![ Auto-Update ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/06.png )
54+ ** Fig 6:** MemProcFS-Analyzer checks for updates (Second Run)
5055
51- ![ IPinfo] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/07.png )
52- ** Fig 7:** GeoIP w/ IPinfo.io
56+ Note: It's recommended to uncomment/disable the "Updater" function after installation. Check out the "Main" in the bottom of the script.
5357
54- ![ IPinfo ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231 /Screenshots/08 .png )
55- ** Fig 8 :** Map IPs w/ IPinfo.io
58+ ![ ClamAV-Scan ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/07 .png )
59+ ** Fig 7 :** FindEvil feature and additional analytics
5660
57- ![ Elasticsearch ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231 /Screenshots/09 .png )
58- ** Fig 9 :** Processing Windows Event Logs (EVTX)
61+ ![ IPinfo ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/08 .png )
62+ ** Fig 8 :** GeoIP w/ IPinfo.io
5963
60- ![ Amcache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231 /Screenshots/10 .png )
61- ** Fig 10 :** Processing extracted Amcache.hve &# 8594 ; XLSX
64+ ![ IPinfo ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/09 .png )
65+ ** Fig 9 :** Map IPs w/ IPinfo.io
6266
63- ![ ShimCache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231 /Screenshots/11 .png )
64- ** Fig 11 :** Processing ShimCache &# 8594 ; XLSX
67+ ![ Elasticsearch ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/10 .png )
68+ ** Fig 10 :** Processing Windows Event Logs (EVTX)
6569
66- ![ ELK-Import ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231 /Screenshots/12 .png )
67- ** Fig 12 :** ELK Import
70+ ![ Amcache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/11 .png )
71+ ** Fig 11 :** Processing extracted Amcache.hve &# 8594 ; XLSX
6872
69- ![ ELK-Timeline ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231 /Screenshots/13 .png )
70- ** Fig 13 :** Happy ELK Hunting!
73+ ![ ShimCache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/12 .png )
74+ ** Fig 12 :** Processing ShimCache &# 8594 ; XLSX
7175
72- ![ Secure-Archive-Container ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231 /Screenshots/14.png )
73- ** Fig 14 :** ClamAV Scan found 29 infected file(s )
76+ ![ Timeline-Explorer ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/14.png )
77+ ** Fig 13 :** Analyze CSV output w/ Timeline Explorer (TLE )
7478
75- ![ Message-Box ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231 /Screenshots/15 .png )
76- ** Fig 15 :** Press ** OK ** to shutdown MemProcFS and Elastisearch/Kibana
79+ ![ ELK-Import ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750 /Screenshots/13 .png )
80+ ** Fig 14 :** ELK Import
7781
78- ![ Output] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/fe680d22179db991ffd8f9851e8ea2374455d231/Screenshots/16.png )
79- ** Fig 16:** Secure Archive Container (PW: MemProcFS)
82+ ![ ELK-Timeline] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/15.png )
83+ ** Fig 15:** Happy ELK Hunting!
84+
85+ ![ Secure-Archive-Container] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/16.png )
86+ ** Fig 16:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
87+
88+ ![ Message-Box] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/17.png )
89+ ** Fig 17:** Press ** OK** to shutdown MemProcFS and Elastisearch/Kibana
90+
91+ ![ Output] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/7e190fc50b1844e0e7f8ff287ab08e5040e3c750/Screenshots/18.png )
92+ ** Fig 18:** Secure Archive Container (PW: MemProcFS)
93+
94+ ## Introduction MemProcFS and Memory Forensics
95+ Check out [ Super Easy Memory Forensics] ( https://www.slideshare.net/IIJ_PR/super-easy-memory-forensics ) by [ Hiroshi Suzuki] ( https://twitter.com/herosi_t ) and [ Hisao Nashiwa] ( https://twitter.com/unk0unk0 ) .
8096
8197## Prerequisites
82- 1 . Download and install the latest Dokany Library Bundle (Redistributable packaged) → ; DokanSetup_redist.exe
83- The Dokany installer will also install the required Microsoft Visual C++ Redistributables for Visual Studio 2019.
98+ 1 . Download and install the latest Dokany Library Bundle → ; DokanSetup.exe
8499https://github.com/dokan-dev/dokany/releases/latest
85100
86- 2 . Download and install the latest Windows package of ClamAV.
87- https://www.clamav.net/downloads
101+ 2 . Download and install the latest .NET 6 Desktop Runtime (Requirement for [ EZTools] ( https://ericzimmerman.github.io/ ) )
102+ https://dotnet.microsoft.com/en-us/download/dotnet/6.0
103+
104+ 3 . Download and install the latest Windows package of ClamAV.
105+ https://www.clamav.net/downloads#otherversions
88106
89- 3 . First Time Set-Up of ClamAV
107+ 4 . First Time Set-Up of ClamAV
90108Launch Windows PowerShell console as Administrator.
91109` cd "C:\Program Files\clamav" `
92110` copy .\conf_examples\freshclam.conf.sample .\freshclam.conf `
93111` copy .\conf_examples\clamd.conf.sample .\clamd.conf `
94112` write.exe .\freshclam.conf ` → ; Comment or remove the line that says “Example”.
95113` write.exe .\clamd.conf ` → ; Comment or remove the line that says “Example”.
96- https://www .clamav.net/documents/installing-clamav-on- windows
114+ https://docs .clamav.net/manual/Usage/Configuration.html# windows
97115
98- 4 . Create your free IPinfo account [ approx. 1-2 min]
116+ 5 . Create your free IPinfo account [ approx. 1-2 min]
99117https://ipinfo.io/signup?ref=cli
100- Open "MemProcFS-Analyzer.ps1" with your text editor, search for "access_token" and copy/paste your access token.
118+ Open "MemProcFS-Analyzer.ps1" with your text editor, search for "< access_token> " and copy/paste your access token.
101119
102- 5 . Install the NuGet package provider for PowerShell
120+ 6 . Install the NuGet package provider for PowerShell
103121Check if NuGet is available in the package providers by running the following command:
104122` Get-PackageProvider -ListAvailable `
105123If NuGet is not installed on your system yet, you have to install it.
106124` Install-PackageProvider -Name NuGet -Force `
107125
108- 6 . Done! :smiley :
126+ 7 . Done! :smiley :
109127
110128## Dependencies
111- 7-Zip 9.20 Command Line Version (2010-11-18 )
129+ 7-Zip 22.00 Standalone Console (2022-06-15 )
112130https://www.7-zip.org/download.html
113131
114- AmcacheParser v1.4.0 .0 (2021-03-20 )
115- https://binaryforay.blogspot.com /
132+ AmcacheParser v1.5.1 .0 (.NET 6 )
133+ https://ericzimmerman.github.io /
116134
117- AppCompatCacheParser v1.4.4 .0 (2021-03-20 )
118- https://binaryforay.blogspot.com /
135+ AppCompatCacheParser v1.5.0 .0 (.NET 6 )
136+ https://ericzimmerman.github.io /
119137
120- ClamAV - Windows Packages → ; Win64 → ; ClamAV-0.103.2.exe (2021-04-07)
121- https://www.clamav.net/downloads
122- https://www.clamav.net/documents/installing-clamav-on-windows → ; First Time Set-Up
138+ ClamAV - Alternate Versions → ; Windows Packages → ; Win64 → ; clamav-0.105.0.win.x64.msi (2022-05-03)
139+ https://www.clamav.net/downloads#otherversions
123140
124- Dokany Library Bundle v1.4.0. 1000 x64 (2020-06-01 )
125- https://github.com/dokan-dev/dokany/releases/latest → ; DokanSetup_redist .exe
141+ Dokany Library Bundle v2.0.5. 1000 (2022-07-04 )
142+ https://github.com/dokan-dev/dokany/releases/latest → ; DokanSetup .exe
126143
127- Elasticsearch 7.13.2 (2021 -06-14 )
144+ Elasticsearch 8.3.1 (2022 -06-30 )
128145https://www.elastic.co/downloads/elasticsearch
129146
130- EvtxECmd v0.6.5 .0 (2020-12-21 )
131- https://binaryforay.blogspot.com /
147+ EvtxECmd v1.0.0 .0 (.NET 6 )
148+ https://ericzimmerman.github.io /
132149
133- ImportExcel 7.1.2 (2020-05-08 )
150+ ImportExcel 7.7.0 (2022-07-04 )
134151https://github.com/dfinke/ImportExcel
135152
136- Ipinfo CLI 2.0 .0 (2021-05-26 )
153+ Ipinfo CLI 2.8 .0 (2022-03-21 )
137154https://github.com/ipinfo/cli
138155
139- Kibana 7.13.2 (2021 -06-14 )
156+ Kibana 8.3.1 (2022 -06-30 )
140157https://www.elastic.co/downloads/kibana
141158
142- MemProcFS v4.1.0 - The Memory Process File System (2021 -06-13 )
159+ MemProcFS v4.9.3 - The Memory Process File System (2022 -06-15 )
143160https://github.com/ufrisk/MemProcFS
144161
145- Microsoft Visual C++ Redistributables for Visual Studio 2019
146- https://go.microsoft.com/fwlink/?LinkId=746572 &# 8594 ; VC_redist.x64.exe
162+ RECmd v2.0.0.0 (.NET 6)
163+ https://ericzimmerman.github.io/
147164
148- Registry Explorer/RECmd v1.6 .0.0 (2021-06-08 )
149- https://binaryforay.blogspot.com /
165+ SBECmd v2.0 .0.0 (.NET 6 )
166+ https://ericzimmerman.github.io /
150167
151- ShellBags Explorer v1.4.0.0 (2021 -05-24 )
152- https://binaryforay.blogspot. com/
168+ xsv v0.13.0 (2018 -05-12 )
169+ https://github. com/BurntSushi/xsv
153170
154171## Links
155172[ MemProcFS] ( https://github.com/ufrisk/MemProcFS )
156173[ Demo of MemProcFS with Elasticsearch] ( https://www.youtube.com/watch?v=JcIlowlrvyI )
157- [ Sponsor MemProcFS project ] ( https://github.com/sponsors/ufrisk )
174+ [ Sponsor MemProcFS Project ] ( https://github.com/sponsors/ufrisk )
158175[ MemProcFSHunter] ( https://github.com/memprocfshunt/MemProcFSHunter )
176+ [ MemProcFS-Plugins] ( https://github.com/ufrisk/MemProcFS-Plugins )
0 commit comments