MemProcFS Analyzer v0.9 releases: Automated Forensic Analysis of Windows Memory Dumps
MemProcFS Analyzer
MemProcFS-Analyzer.ps1 is a PowerShell script utilized to simplify the usage of MemProcFS and to assist with the analysis workflow.
Features:
- Auto-Install of MemProcFS, EvtxECmd, Elasticsearch, Kibana
- Auto-Update of MemProcFS, EvtxECmd (incl. Maps), Elasticsearch, Kibana, ClamAV Virus Databases (CVD)
- Update-Info when there’s a new version of ClamAV or a new Redistributable packaged Dokany Library Bundle available
- Multi-Threaded scan w/ ClamAV for Windows
- Extracting IPv4/IPv6
- IP2ASN Mapping w/ Team Cymru
- Checking for Unusual Parent-Child Relationships
- Extracting Windows Event Log Files and processing w/ EvtxECmd → Timeline Explorer (EZTools by Eric Zimmerman)
- Collecting Evidence Files (Secure Archive Container → PW: MemProcFS)
Usage
Launch Windows PowerShell ISE or Visual Studio Code (PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
Change log v0.9
Added: FS_Forensic_Yara (YARA Custom Rules)
Added: FS_Forensic_Files (incl. ClamAV)
Added: Checking for suspicious processes with double file extensions
Added: Checking for Command and Scripting Interpreters
Added: Recent Folder Artifacts
Added: Hunting Suspicious Image Mounts
Added: OpenSaveMRU (OpenSavePidlMRU)
Added: LastVisitedMRU (LastVisitedPidlMRU)
Added: Terminal Server Client (RDP)
Added: Kroll RECmd Batch File v1.21 (2023-03-04)
Added: Improved Microsoft Defender AntiVirus Handling
Added: Improved Drive Letter (Mount Point) Handling
Fixed: Other minor fixes and improvements
Download
Copyright (C) 2021 evild3ad